You have a heavily virtualized environment in which all of your virtual machines are hosted on a few large, shared servers. For security reasons, you must restrict inter-VM traffic and only allow traffic that complies with your security policies.
Which two technologies would you use to restrict inter-VM traffic? (Choose two.)
Daniel
1 years agoTommy
1 years agoAllene
1 years agoArthur
1 years agoBecky
1 years agoKati
1 years agoFelice
1 years agoDorathy
1 years agoTrina
1 years agoOra
1 years agoFiliberto
1 years agoKarl
1 years agoDominque
1 years agoRuthann
1 years agoOmega
1 years agoZena
1 years agoNoemi
1 years agoPamela
1 years agoCarin
1 years agoDelmy
1 years agoJenelle
1 years ago